Introduction to Computer Networks
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following BEST describes the role of the transmitter in a simplified communication model?

  • Transforms and encodes data into a transmittable form. (correct)
  • Accepts the already encoded signal from the transmission system.
  • Generates the data to be transmitted, like a computer.
  • Receives incoming data from the receiver.

In computer networks, under what circumstances is a communication network MOST necessary instead of a direct point-to-point connection?

  • When devices are located very close to each other.
  • When only two devices need to communicate with each other.
  • When devices are geographically distant or need to communicate with multiple other devices. (correct)
  • When devices need permanent, dedicated connections.

What technological advancement has MOST significantly reduced transmission costs for telephone networks while simultaneously increasing their capacity?

  • The development of ISDN.
  • Mobile communication networks.
  • Advances in VLSI technology.
  • The introduction of optical fibers. (correct)

What is a key challenge mobile communication networks face regarding bandwidth?

<p>The need for efficient bandwidth management due to limited spectrum. (A)</p> Signup and view all the answers

What is the PRIMARY function of Local Area Networks (LANs)?

<p>To operate within a small geographical area, allowing interconnection of computers and peripherals. (D)</p> Signup and view all the answers

Why are common transmission methods essential for computers to communicate effectively on a network?

<p>To allow devices from different manufacturers to interact predictably. (C)</p> Signup and view all the answers

Which of the following accurately describes the purpose of the OSI model's layered architecture?

<p>To manage and upgrade functions more easily without disrupting the entire system. (C)</p> Signup and view all the answers

In the OSI model, what is the role of N-layer protocol?

<p>To execute communications between same-level entities. (B)</p> Signup and view all the answers

In the context of OSI model data transmission, what BEST explains the role of headers?

<p>Headers offer control information as data moves for peer protocol management. (D)</p> Signup and view all the answers

Within the OSI model, what is the function of Service Access Points (SAPs)?

<p>To allow layers to communicate logically. (C)</p> Signup and view all the answers

Which OSI model layer is responsible for the reliable transfer of data frames, handling error checking, and implementing flow control?

<p>Data-Link Layer. (D)</p> Signup and view all the answers

What does the Network Layer in the OSI model primarily handle?

<p>Switching and routing to establish network connections. (B)</p> Signup and view all the answers

Which of the following BEST describes the role of the Transport Layer in the OSI model?

<p>Providing reliable end-to-end communication services between applications. (A)</p> Signup and view all the answers

The PRIMARY role of the Presentation Layer within the OSI reference model is to provide what?

<p>Independence from specific data representation formats. (B)</p> Signup and view all the answers

What is the Application Layer in the OSI model concerned with?

<p>Defining the semantics of the specific application. (D)</p> Signup and view all the answers

In IP networking, what is a key simplification of the OSI model?

<p>Combining Session, Presentation, and Application functions into one layer. (D)</p> Signup and view all the answers

What is a defining characteristic of a mesh network topology?

<p>Devices are connected to multiple, but not all, other devices. (C)</p> Signup and view all the answers

In hierarchical networks, what type of structure is typically used?

<p>A tree-like structure with devices arranged in levels. (A)</p> Signup and view all the answers

What critical function do intermediate nodes perform in both mesh and hierarchical networks?

<p>Routing and switching data efficiently. (D)</p> Signup and view all the answers

What characterizes a star network configuration?

<p>Each device connects to a central node through individual links. (B)</p> Signup and view all the answers

What is a PRIMARY disadvantage of a star network topology?

<p>Vulnerability due to reliance on a single central node. (D)</p> Signup and view all the answers

In a bus network topology, how do devices receive data transmissions?

<p>All devices receive all transmissions. (C)</p> Signup and view all the answers

What is a key limitation of a BUS network topology?

<p>Limited bandwidth shared among devices. (C)</p> Signup and view all the answers

In a ring topology, how are devices connected?

<p>In a closed-loop configuration via point-to-point links. (C)</p> Signup and view all the answers

Repeaters are leveraged for what fundamental task in the Ring Topology?

<p>Data copying as it passes to the destination. (B)</p> Signup and view all the answers

In the context of network hubs, what does it mean for a central node to be 'passive'?

<p>It simply splits signals without processing them. (B)</p> Signup and view all the answers

What is a Primary function of active hubs, also know as 'repeater hubs'?

<p>They boost signals, enabling longer cable runs and more devices. (B)</p> Signup and view all the answers

In the context of multiple access methods, what characterizes 'fixed assignment'?

<p>Allocating transmission channels on a static basis. (D)</p> Signup and view all the answers

Which scenario is DIRECTLY addressed by Random Access methods?

<p>Allowing for devices to flexibly contend for network use. (D)</p> Signup and view all the answers

Why are distributed access controls often preferred for LANs?

<p>They increase network reliability. (C)</p> Signup and view all the answers

Which technique is BEST suited for adapting to changing network needs for access?

<p>Adaptive Strategies. (B)</p> Signup and view all the answers

Where are FDMA and TDMA techniques typically used?

<p>Satellite links. (A)</p> Signup and view all the answers

What is a PRIMARY benefit of CDMA as an access method?

<p>It is resistant to interference. (B)</p> Signup and view all the answers

Which statement BEST represents the overall goal of access techniques for LANs?

<p>To monitor and react to changes in data transfer requirements. (B)</p> Signup and view all the answers

In the ALOHA access protocol, what happens when a station has a frame to send?

<p>It immediately transmits the frame. (A)</p> Signup and view all the answers

In ALOHA, in the event of repeated frame transmission failures on a network, what action does a station take?

<p>After a set number of re-attempts, the transmission is then stopped. (B)</p> Signup and view all the answers

What PRIMARY action is taken by the receiving station in the ALOHA protocol upon receiving a frame?

<p>It verifies frame correctness and sends its acknowledgement. (A)</p> Signup and view all the answers

What are the two Primary reasons for invalid frames in the ALOHA protocol?

<p>Channel noise and concurrent transmissions. (B)</p> Signup and view all the answers

What describes 'vulnerable period' in the context of ALOHA protocols?

<p>The time frame during which frames can collide and cause corrupted transmissions. (C)</p> Signup and view all the answers

If 'P' represents the packet transmission time in pure ALOHA, what is its vulnerable period?

<p>2P. (B)</p> Signup and view all the answers

Why is Slotted ALOHA more efficient than Pure ALOHA?

<p>It reduces the vulnerable windows for data collision. (A)</p> Signup and view all the answers

What typically happens to network throughput under heavily trafficked conditions when using ALOHA protocols?

<p>It decreases due to frequent collisions. (C)</p> Signup and view all the answers

Flashcards

Communications System

The fundamental purpose of a communications system is the exchange of data between two parties.

Source

Generates the data to be transmitted. E.g., Phones and PCs.

Transmitter

Transformation and encoding of data in a suitable form for the transmission system.

Transmission System

Single transmission line or a complex network connecting source and destination.

Signup and view all the flashcards

Receiver

Accepts signal from transmission system and converts it into a form suitable for the destination device.

Signup and view all the flashcards

Destination

Takes incoming data from the receiver.

Signup and view all the flashcards

Simplest form of data communication

Data communication takes place between two devices that are directly connected by some form of point-to-point transmission medium.

Signup and view all the flashcards

Telephone Network advancements include

Reduced transmission costs, increased capacity, increased capabilities of modern exchanges, Mobile communication networks

Signup and view all the flashcards

Data Communications advancements include

Interconnection of computers and peripheral equipment (through LANs), greater interconnection of local networks (through WANs), integration of the above services

Signup and view all the flashcards

Local Area Networks (LANs)

Cover a limited area, allowing for different network structures and data access methods.

Signup and view all the flashcards

LAN Topologies

Star, ring, or bus

Signup and view all the flashcards

Common Communication Protocols

Ensure that devices from different manufacturers can communicate effectively.

Signup and view all the flashcards

Ensure compatibility, developed for data communication.

OSI Model

Signup and view all the flashcards

Network Architecture

The set of rules and conventions that define how a network operates

Signup and view all the flashcards

Protocol Stack

The set of rules grouped to allow data trasmission

Signup and view all the flashcards

Layering

Group functions into manageable and logical sets; can be upgraded without affecting the whole system.

Signup and view all the flashcards

Entities at same layer

Communicate via an N layer protocol- Virtual communication path

Signup and view all the flashcards

Topology

The small geographical coverage of LANs allows for different topologies (device connectivity) and access techniques to be used

Signup and view all the flashcards

OSI Model

Common protocols must be used. Equipment in a network, may be of different types, and from different manufacturers. Standard protocols are required

Signup and view all the flashcards

OSI Model

The OSI model works like a structured service system, where each layer helps the layer above it by providing specific services.

Signup and view all the flashcards

Each Layer

Each layer acts as a service provider for the layer above it and as a service user for the layer below it.

Signup and view all the flashcards

Service primitives

Help one layer request, send, or confirm data from another

Signup and view all the flashcards

Headers

Are added to data as it moves down the layers. These headers are later removed at the destination

Signup and view all the flashcards

Transport Layer

Ensure end-to-end communication between devices

Signup and view all the flashcards

Session Layer

Organizes and controls communication between two devices.

Signup and view all the flashcards

Presentation Layer

Ensures data is in the right format so different systems can understand it.Acts as a translator between different data types.

Signup and view all the flashcards

Application Layer

handles user authentication (logging in), file transfers, sending messages, and accessing databases

Signup and view all the flashcards

Bus Topologies

All devices share a single communication line (cable).

Signup and view all the flashcards

STAR Configuration

Every device (computer, printer, etc.) is connected to a central node (such as a switch or hub) through individual point-to-point connections.

Signup and view all the flashcards

RING Topology

Devices are joined by a series of point-to-point links to form a closed loop

Signup and view all the flashcards

Hub-Based Networks

A setup where all devices connect to a central hub, but the way the hub works determines how the network behaves

Signup and view all the flashcards

Fixed Assignment

Channels are allocated on a static basis. Not used in LAN's

Signup and view all the flashcards

Random Contentions

Methods allow the entire b/w to be accessed randomly or contended for.

Signup and view all the flashcards

Scheduled Access

Methods may be centrally controlled with the controller allocating time or b/w according to demand.

Signup and view all the flashcards

Adaptive Strategies

Change the access technique according to the demands placed on the network

Signup and view all the flashcards

Vulnerable period

The time during which a packet is at risk

Signup and view all the flashcards

Pure ALOHA

A packet will be successfully transmitted if no other frames are transmitted P seconds before or after it, where P is the packet transmission time

Signup and view all the flashcards

Access network

Carrier Sense Multiple Access (CSMA) A device checks if the network is free before sending data

Signup and view all the flashcards

CSMA Algorithm

If the network is free it is successful transmitted , if it had a collision it waits for a random time and reattempts to transmit

Signup and view all the flashcards

Study Notes

Course Objectives

  • Students will learn the basic concepts of computer networks, including network architectures, protocols, and standards like TCP/IP, OSI model, LAN/WAN, and topologies.
  • Students will understand the functions of core networking devices like routers, switches, bridges, and gateways and how they enable connectivity and communication.
  • Students will analyze the trade-offs between connection-oriented and connectionless services, circuit switching vs packet switching, and other network technology comparisons.
  • Students will design and configure local area networks with addressing schemes and routing/switching equipment tailored to meet networking requirements.
  • Students will evaluate network protocol stacks to pinpoint common networking issues across physical, data link, and upper layer components.
  • Students will troubleshoot connectivity, performance, and reliability issues using tools like ping, traceroute, and SNMP.
  • Students will learn network troubleshooting methodologies
  • Students will demonstrate understanding of network and infrastructure security issues and mitigation approaches.

Course Content

  • Week 1: Introduction to networking
  • Week 2: Local Area Network Protocols and Standards
  • Week 3: Physical Media
  • Week 4: IP Networks
  • Week 5: Network Design and Simulation, IPv4
  • Week 6: Mid Semester Exam
  • Week 7 & 8: IPv6
  • Week 9: Industrial Seminar
  • Week 10 & 11: Network Security
  • Week 12: Final Examination

Course Assessment

  • Participation and Class Engagement accounts for 5% of the grade.
  • Quizzes and Assignments make up 15%.
  • Group Project is 10% of the grade.
  • Mid-Semester Exams contribute 20%.
  • Final Exam is weighed at 50%.
  • Continuous Assessment will include Mid-Semester Exams (20%) and Quizzes and Assignments (10%), for a total of 30%.
  • All other forms of Assessment will culminate into the End of Semester Score of 70%

Lecture 1: Introduction

  • Topics include communication models, definitions of computer networks, LANs, WANs, ISO – OSI reference model, as well as network components and topologies.

Simplified Communication Model

  • The primary goal of any communication system involves exchanging data between two points
  • Source: Generates the data to be transmitted, e.g., phones and PCs.
  • Transmitter: Transforms and encodes data into a suitable form for the transmission system.
  • Transmission System: A single transmission line or a complex network connecting source and destination.
  • Receiver: Accepts the signal from the transmission system and adapts it into a form suitable for the destination device.
  • Destination: Receives the incoming data from the receiver.

Communication Networks

  • Data communication occurs between two devices directly connected by a point-to-point transmission medium.
  • A communication network is needed when devices can't be directly connected.
  • Optical fibres have reduced transmission costs for telephone networks and increased capacities.
  • Satellite communications have enhanced long-distance routes' information-carrying capacity.
  • Advances in VLSI technology have led to powerful computers for telephone exchange control
  • Mobile communication faces bandwidth constraints
  • Computers increased data communications leading to interconnecting computers, terminals, printers at a local level
  • Connections to other distant networks are implemented via point-to-point links originally implemented as part of the telephone network, or other WANs.
  • voice and data networks converge digital techniques in telephone and mobile telephony networks.

Local Area Networks (LANs)

  • LANs operate within a limited geographical area, allowing for different network structures and data access methods compared to larger networks.
  • LAN design considerations include network topologies, access techniques, and the parameter, which relates to the ratio of data propagation time to data packet duration.
  • Common protocols must be used for computers to be able to communicate effectively.
  • Standardization is often based on the ISO Open Systems Interconnection (OSI) model, which provides a structured approach to network communication

The OSI Model and Layered Network Architecture

  • Architecture: A system's rules and conventions.
  • Protocol Stack: Protocols governing communications.
  • The OSI model organizes communication into layers for easier function management and upgrading.

Layered Communication

  • Entities at the same OSI layer communicate via an N-layer protocol, creating a virtual communication path.
  • Communication goes through the layer and back up at the destination end.
  • Each layer adds control (header) information which gets removed by corresponding layer at the receiving end.

Layer Operations

  • Each layer is a SERVICE PROVIDER to the layer, and a SERVICE USER to the layer below it.
  • N services are given to N+1 entities via SAPs logical interfaces.
  • The interaction is managed with SERVICE PRIMITIVES, creating headers.

OSI Model: Lower Layers

  • The lower layers depend on the physical technology used and are network dependant
  • Physical Layer (Layer 1): Sends raw bits (1s and 0s) over a physical connection, including bit synchronization, cable types, connector shapes, and electrical signal levels.
  • Data-Link Layer (Layer 2): Provides reliable data transfer by organizing bits into frames, error checking, and flow control, employing character-oriented or bit-oriented protocols.
  • Network Layer (Layer 3): Determines the best data path between devices on different networks including switching and routing.

OSI Model: Upper Layers

  • Operate at the host level
  • Application: Semantics of app and allows user access by CASES and SASEs
  • Presentation: Independence of the data by syntax and provides encryption.
  • Session: Structures dialogue and establishes synchronization points and address mapping.
  • Transport: Provided end to service communications.

Network Topologies

  • Devices are connected in different structures (topologies) depending on how devices are connected.
  • Mesh Networks:
    • Devices are connected to multiple devices and are used in packet-switched WANs
  • Hierarchical Networks:
    • Tree like structure for connections, used commonly in telephone systems
  • Routing and Switching:
    • Decisions on data flow between devices on where to send data for effective transfer of data

Star Configuration

  • Every device connects to a central node through point-to-point connections
  • The node controls all communications send to the correct device
  • Intergrates easily with phone systems
  • High speed connections can occur and can be used with single access control
  • The central not takes most off the burden of workload and if it fails, the network is affected.

Bus Topology

  • Devices are connected together with a single cable
  • Signal is heard by all transmitted devices
  • Processing, packetization, and access control is needed for all devices
  • Easy for new units to connect and single failures doesn't affect the network
  • However, cables could reduce bandwidth due to attenuation and is shared amoungst users
  • Data gets transmitted by all devices and each device needs to consider whether they need it or not

Ring Topology

  • Repeaters are joined by point-to-point links to close the loop
  • Data is sent in sequence by each device
  • Is easy to install and has efficient use of bandwidth
  • Not easy to troubleshoot and has limited scalability

Topologies using Hubs

  • Central Node (HUB) is passive, with bus or rings
  • usually contains repeater electronics to enable longer link distance

Multiple Access: Broad Categories

  • Based on the topology of LAN to give rise to methods of sharing network.
  • Fixed Assignment: Channels allocated are static.
  • Random/Contention Access: bandwidth is accessed randomly leading to packet collisions.
  • Scheduled Access: methods can be centrally and can be distributed depending on how many devices that need use cases
  • Adaptive Strategies can accommodate for demands on new networks

ALOHA

  • a protocol was developed c.1970 for a packet-radio broadcast network at the University of Hawaii and does not have a LAN concept to local networking. It is a very simple, purely random access protocol.
  • Receiving checks for valid frames
  • Invalid frames can be caused by*:
  • Channel noise.
  • Another interference in transmission.

Pure-ALOHA

  • A packet is effectively transferred if no other frames are transferred before "P"
  • meaning P transmission time giving "2P" for period.

Network performance measures

  • Measured in terms of data transfer through units
  • normalising: s= λp/ r
  • Throughput express in terms of offered load: G = λr/ r

Performance of pure - aloha

  • Throughput = offered load . prob. of transmisions done succesfully
  • Using G = λp,

Slotted ALOHA

Time is grouped into units to:

  • Reduce period known as vulnerable
  • Increase throughput

Performance of Aloha protocols

  • The throughput lowers due to greater collision rate
  • Retransmission rises and offered rises as well

Transmission attempts & Random retransmission delays

  • Algoriths are often used when it deals with packet collisions
  • Tends to give more throughput

Effect of propagation data delay (at distance)

  • Vulerable time period rises to consider data delay period

Carrier sense multiple access (CSMA)

  • Stations knowledgable of of packet transmissions
    • follow a Listen Before Talk protocol
    • Vulnerable time period is reduced to delay network
  • Protocols are "slotted".
  • Randomn distributed transmissions follow collisions

Basic CSMA Protocols :

  • Non persistent
    • Where transmissions wait for random time
  • Persistent
    • Waits for collisions for for channel
  • P- persistent proctocols
    • Used w/ a slotted scheme and transmissions are done using this setup

Graphs of throughput as function of load

Different persistences compare with load Show that Non-Persistent have better peak throughput compared to other

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore fundamental concepts of computer networks with focus on network architectures, protocols, and networking devices. Compare connection-oriented vs connectionless services. Master troubleshooting connectivity, performance, and reliability issues.

More Like This

OSI Model and Network Protocols Quiz
30 questions
OSI Model and Network Protocols Quiz
16 questions
OSI Model and Network Protocols Quiz
31 questions
Use Quizgecko on...
Browser
Browser